Skip to main content
guest
Join
|
Help
|
Sign In
DLTM
Home
guest
|
Join
|
Help
|
Sign In
DLTM
Wiki Home
Recent Changes
Pages and Files
Members
Favorites
20
All Pages
20
home
Questions
Add
Add "All Pages"
Done
Questions
Edit
0
1
…
0
Tags
No tags
Notify
RSS
Backlinks
Source
Print
Export (PDF)
Student Objectives
The essence of this section is to enable you to;
Analyze the relationships among ethical, social, and political issues that are raised by information systems.
Identify the main moral dimensions of an information society and specific principles for conduct that can be used to guide ethical decisions.
Evaluate the impact of contemporary information systems and the Internet on the protection of individual privacy and intellectual property.
Assess how information systems have affected everyday life.
Question 1.
Which moral dimension of the information age involves cultural values and practices?
Open Hint for Question 1 in a new window.
Information rights and obligations
Accountability and control
Property rights and obligations
Quality of life
End of Question 1
Question 2.
Using computers to combine data from multiple sources and creating electronic dossiers of detailed information on individuals is called
Open Hint for Question 2 in a new window.
nonobvious relationship awareness (NORA).
profiling.
due process.
informed consent.
End of Question 2
Question 3.
Correlating relationships to find obscure hidden connections in disparate databases and other sources is called
Open Hint for Question 3 in a new window.
nonobvious relationship awareness.
profiling.
due process.
informed consent.
End of Question 3
Question 4.
A basic ethical concept that means mechanisms are in place to determine who took responsible action or who is responsible for certain actions is
Open Hint for Question 4 in a new window.
responsibility.
liability.
accountability.
due process.
End of Question 4
Question 5.
Most American and European privacy law is based on a regime called
Open Hint for Question 5 in a new window.
fair information practices (FIP).
privacy rights of individuals.
safe harbor theories.
opt-out models of informed consent.
End of Question 5
Question 6.
Tiny files deposited on a computer hard drive when a user visits certain Web sites are called
Open Hint for Question 6 in a new window.
Web bugs.
cookies.
safe harbors.
viruses.
End of Question 6
Question 7.
The model of informed consent permits the collection of personal information until the consumer specifically requests that data not be collected.
Open Hint for Question 7 in a new window.
safe harbor
platform for privacy preferences
opt-out
opt-in
End of Question 7
Question 8.
An intellectual work product used for a business purpose is classified as a provided it is not based on information in the public domain.
Open Hint for Question 8 in a new window.
copyright
patent
digital millennium copyright
trade secret
End of Question 8
Question 9.
Which law protects creators of intellectual property for the life of the author plus an additional 70 years after the author's death?
Open Hint for Question 9 in a new window.
Copyright
Trade secret
Patent
Digital Millennium copyright
End of Question 9
Question 10.
Which law grants the owner an exclusive monopoly on the ideas behind an invention for 20 years?
Open Hint for Question 10 in a new window.
Copyright
Trade secret
Patent
Digital millennium copyright
End of Question 10
Question 11.
The commission of acts involving a computer that may not be illegal but are considered unethical is known as
Open Hint for Question 11 in a new window.
computer crime.
information privacy violations.
lack of accountability.
computer abuse.
End of Question 11
Question 12.
Which of the following is
not
a principal source of poor system performance?
Open Hint for Question 12 in a new window.
Software bugs and errors
Government regulation
Hardware or facility failures
Poor input data quality
End of Question 12
Question 13.
Which of the following makes it illegal to circumvent technology-based protections of copyrighted materials?
Open Hint for Question 13 in a new window.
Freedom of Information Act of 1966
E-Government Act of 2002
World Intellectual Property Organization Treaty
Electronic Communications Privacy Act of 1986
End of Question 13
Question 14.
The single largest source of repetitive stress injuries is
Open Hint for Question 14 in a new window.
computer monitors.
computer keyboards.
computer mouse.
computer speakers.
End of Question 14
Question 15.
The most common kind of computer-related repetitive stress injury is
Open Hint for Question 15 in a new window.
computer vision syndrome.
severe back pain.
technostress.
carpal tunnel syndrome (CTS).
End of Question 15
Question 16.
In today's new legal environment, managers who violate the law and are convicted will most likely spend time in prison.
Open Hint for Question 16 in a new window.
True
False
End of Question 16
Question 17.
Information systems don't necessarily threaten existing distributions of power, money, rights, and obligations.
Open Hint for Question 17 in a new window.
True
False
End of Question 17
Question 18.
Political institutions do not require a demonstration of real harm before they develop new laws governing information systems.
Open Hint for Question 18 in a new window.
True
False
End of Question 18
Question 19.
Advances in data storage techniques and rapidly declining storage costs have been responsible for the multiplying databases on individuals.
Open Hint for Question 19 in a new window.
True
False
End of Question 19
Question 20.
Accountability means that you accept the potential costs, duties, and obligations for the decisions you make.
Open Hint for Question 20 in a new window.
True
False
End of Question 20
Question 21.
At present, most U.S. federal privacy laws apply only to the federal government and regulate very few areas of the private sector.
Open Hint for Question 21 in a new window.
True
False
End of Question 21
Question 22.
A safe harbor requires government regulation and enforcement.
Open Hint for Question 22 in a new window.
True
False
End of Question 22
Question 23.
Most Internet businesses do little to protect customer privacy.
Open Hint for Question 23 in a new window.
True
False
End of Question 23
Question 24.
Copyright law protects both the underlying ideas behind a work and the manifestation in a work.
Open Hint for Question 24 in a new window.
True
False
End of Question 24
Question 25.
The Internet has made it much easier to protect intellectual property.
Open Hint for Question 25 in a new window.
True
False
End of Question 25
Question 26.
Internet service providers (ISPs) are required to take down sites of copyright infringers that they are hosting once they are notified of the problem.
Open Hint for Question 26 in a new window.
True
False
End of Question 26
Question 27.
Lower-level employees may be empowered to make minor decisions, but the key policy decisions are still very centralized.
Open Hint for Question 27 in a new window.
True
False
End of Question 27
Question 28.
Simply accessing a computer system without authorization or with intent to do harm, even by accident, is now a federal crime.
Open Hint for Question 28 in a new window.
True
False
End of Question 28
Question 29.
Repetitive stress injuries due to computer use are unavoidable.
Open Hint for Question 29 in a new window.
True
False
End of Question 29
Question 30.
According to experts, humans working continuously with computers come to expect other humans to behave like computers.
Open Hint for Question 30 in a new window.
True
False
End of Question 30
Question 31.
Discuss how information systems raise new ethical questions for both individuals and societies.
Open Hint for Question 31 in a new window.
To create paragraphs in your essay response, type <p> at the beginning of the paragraph, and </p> at the end.
End of Question 31
Question 32.
Define the four basic concepts of ethics in an information society.
Open Hint for Question 32 in a new window.
To create paragraphs in your essay response, type <p> at the beginning of the paragraph, and </p> at the end.
End of Question 32
Question 33.
Explain the concept of privacy and what the U.S. government is doing to help protect individual online privacy.
Open Hint for Question 33 in a new window.
To create paragraphs in your essay response, type <p> at the beginning of the paragraph, and </p> at the end.
End of Question 33
Question 34.
Discuss how the Internet and other information technologies challenge intellectual property rights.
Open Hint for Question 34 in a new window.
To create paragraphs in your essay response, type <p> at the beginning of the paragraph, and </p> at the end.
End of Question 34
Question 35.
Discuss how technology impacts our quality of life and describe some of the negative social consequences of systems.
Open Hint for Question 35 in a new window.
To create paragraphs in your essay response, type <p> at the beginning of the paragraph, and </p> at the end.
Javascript Required
You need to enable Javascript in your browser to edit pages.
help on how to format text
Turn off "Getting Started"
Home
...
Loading...
The essence of this section is to enable you to;
Which moral dimension of the information age involves cultural values and practices?
Using computers to combine data from multiple sources and creating electronic dossiers of detailed information on individuals is called
Correlating relationships to find obscure hidden connections in disparate databases and other sources is called
A basic ethical concept that means mechanisms are in place to determine who took responsible action or who is responsible for certain actions is
Most American and European privacy law is based on a regime called
Tiny files deposited on a computer hard drive when a user visits certain Web sites are called
The model of informed consent permits the collection of personal information until the consumer specifically requests that data not be collected.
An intellectual work product used for a business purpose is classified as a provided it is not based on information in the public domain.
Which law protects creators of intellectual property for the life of the author plus an additional 70 years after the author's death?
Which law grants the owner an exclusive monopoly on the ideas behind an invention for 20 years?
The commission of acts involving a computer that may not be illegal but are considered unethical is known as
Which of the following is not a principal source of poor system performance?
Which of the following makes it illegal to circumvent technology-based protections of copyrighted materials?
The single largest source of repetitive stress injuries is
The most common kind of computer-related repetitive stress injury is
In today's new legal environment, managers who violate the law and are convicted will most likely spend time in prison.
Information systems don't necessarily threaten existing distributions of power, money, rights, and obligations.
Political institutions do not require a demonstration of real harm before they develop new laws governing information systems.
Advances in data storage techniques and rapidly declining storage costs have been responsible for the multiplying databases on individuals.
Accountability means that you accept the potential costs, duties, and obligations for the decisions you make.
At present, most U.S. federal privacy laws apply only to the federal government and regulate very few areas of the private sector.
A safe harbor requires government regulation and enforcement.
Most Internet businesses do little to protect customer privacy.
Copyright law protects both the underlying ideas behind a work and the manifestation in a work.
The Internet has made it much easier to protect intellectual property.
Internet service providers (ISPs) are required to take down sites of copyright infringers that they are hosting once they are notified of the problem.
Lower-level employees may be empowered to make minor decisions, but the key policy decisions are still very centralized.
Simply accessing a computer system without authorization or with intent to do harm, even by accident, is now a federal crime.
Repetitive stress injuries due to computer use are unavoidable.
According to experts, humans working continuously with computers come to expect other humans to behave like computers.
Discuss how information systems raise new ethical questions for both individuals and societies.
Define the four basic concepts of ethics in an information society.
Explain the concept of privacy and what the U.S. government is doing to help protect individual online privacy.
Discuss how the Internet and other information technologies challenge intellectual property rights.
Discuss how technology impacts our quality of life and describe some of the negative social consequences of systems.